- -

Strategies for avoiding preference profiling in agent-based e-commerce environments

RiuNet: Institutional repository of the Polithecnic University of Valencia

Share/Send to

Cited by

Statistics

Strategies for avoiding preference profiling in agent-based e-commerce environments

Show full item record

Serrano, E.; Such, JM.; Botia, JA.; García Fornes, AM. (2014). Strategies for avoiding preference profiling in agent-based e-commerce environments. Applied Intelligence. 40(1):127-142. doi:10.1007/s10489-013-0448-2

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10251/50447

Files in this item

Item Metadata

Title: Strategies for avoiding preference profiling in agent-based e-commerce environments
Author:
UPV Unit: Universitat Politècnica de València. Departamento de Sistemas Informáticos y Computación - Departament de Sistemes Informàtics i Computació
Issued date:
Abstract:
Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this domain. Privacy is of great concern and preserving users' privacy ...[+]
Subjects: Privacy , Agent-based e-commerce , Preference profiling , Interaction analysis , Data mining
Copyrigths: Reserva de todos los derechos
Source:
Applied Intelligence. (issn: 0924-669X )
DOI: 10.1007/s10489-013-0448-2
Publisher:
Springer Verlag (Germany)
Publisher version: http://dx.doi.org/10.1007/s10489-013-0448-2
Thanks:
This research work is supported by the Spanish Ministry of Science and Innovation in the scope of the Research Projects TSI-020302-2010-129, TIN2011-28335-C02-02 and through the Fundacion Seneca within the Program 04552/GERM/06.[+]
Type: Artículo

References

Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA’09. IEEE Press, New York, pp 19–24

Aïmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25–33

Aydoğan R, Yolum P (2012) Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104–140. doi: 10.1007/s10458-010-9147-0 [+]
Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA’09. IEEE Press, New York, pp 19–24

Aïmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25–33

Aydoğan R, Yolum P (2012) Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104–140. doi: 10.1007/s10458-010-9147-0

Bahrammirzaee A, Chohra A, Madani K (2013) An adaptive approach for decision making tactics in automated negotiation. Appl Intell. doi: 10.1007/s10489-013-0434-8

Borking J, Van Eck B, Siepel P, Bedrijf D (1999) Intelligent software agents: turning a privacy threat into a privacy protector. Registratiekamer, The Hague

Bouckaert RR, Frank E, Hall M, Kirkby R, Reutemann P, Seewald A, Scuse D (2009) Weka manual (3.7.1). http://prdownloads.sourceforge.net/weka/WekaManual-3-7-1.pdf?download

Buffett S, Spencer B (2005) Learning opponents’ preferences in multi-object automated negotiation. In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC’05. ACM, New York, pp 300–305

Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28:1030–1044

Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: CRYPTO’88: proceedings on advances in cryptology. Springer, New York, pp 319–327

ClaußS, Kesdogan D, Kölsch T (2005) Privacy enhancing identity management: protection against re-identification and profiling. In: DIM’05: proceedings of the 2005 workshop on digital identity management. ACM, New York, pp 84–93

Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego, CA, USA, pp 303–320

Eyharabide V, Amandi A (2012) Ontology-based user profile learning. Appl Intell 36(4):857–869

Fasli M (2007) Agent technology for e-commerce. Wiley, New York

Fip A (2001) FIPA Contract Net Interaction Protocol Specification. FIPA

Fip A (2001) FIPA Iterated Contract Net Interaction Protocol Specification. FIPA

Fischer-Hübner S, Hedbom H (2008) Benefits of privacy-enhancing identity management. Asia Pac Bus Rev 10(4):36–52

Garfinkel S (2001) Database nation: the death of privacy in the 21st century. O’Reilly & Associates, Sebastopol

Gwak J, Sim K (2013) A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas. Appl Intell 38(3):384–417

Hansen M, Berlich P, Camenisch J, Clau S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep 9(1):35–44

Hansen M, Schwartz A, Cooper A (2008) Privacy and identity management. IEEE Secur Priv 6(2):38–45

Hildebrandt M, Gutwirth S (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin

Hindriks K, Tykhonov D (2008) Opponent modelling in automated multi-issue negotiation using Bayesian learning. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS’08, vol 1, Richland, SC, pp 331–338. International Foundation for Autonomous Agents and Multiagent Systems

Hoffman D, Novak T, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80–85

JADE Board. Jade security guide (2005). http://jade.tilab.com

Kang J-G, Kim S, An S-Y, Oh S-Y (2012) A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization. Appl Intell 36(1):242–269

Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320–329

Kim K-J, Ahn H (2012) Simultaneous optimization of artificial neural networks for financial forecasting. Appl Intell 36(4):887–898

Korba L, Song R, Yee G (2002) Anonymous communications for mobile agents. In: Proceedings of the 4th international workshop on mobile agents for telecommunication applications, MATA’02, pp 171–181

Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third conference on artificial intelligence (AAAI-08)

Lee J, Kim J, Moon JY (2000) What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’00. ACM, New York, pp 305–312

Márquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315–330

Menczer F, Street WN, Vishwakarma N, Monge AE, Jakobsson M (2002) Intellishopper: a proactive, personal, private shopping assistant. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 3, AAMAS’02, pp 1001–1008

Newman AE (2004) Cougaar developers’ guide. http://www.cougaar.org

Odlyzko A (2003) Privacy, economics, and price discrimination on the Internet. In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC’03. ACM, New York, pp 355–366

Petkovic M, Jonker W (eds) (2007) Security, privacy and trust in modern data management (Data-centric systems and applications). Springer, Berlin

Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

Quillinan TB, Warnier M, Oey M, Timmer R, Brazier F (2008) Enforcing security in the agentscape middleware. In: Proceedings of the 2008 workshop on middleware security, MidSec’08. ACM, New York, pp 25–30

Rannenberg K, Royer D, Deuker A (eds) (2009) The future of identity in the information society: challenges and opportunities. Springer, Berlin

Recursion Software Inc. (2008) Voyager security guide. http://www.recursionsw.com/

Roth V, Jalali-Sohi M (2001) Concepts and architecture of a security-centric mobile agent server. In: ISADS

Serrano E, Gómez-Sanz JJ, Botia JA, Pavón J (2009) Intelligent data analysis applied to debug complex software systems. Neurocomputing 72(13–15):2785–2795

Serrano E, Quirin A, Botia J, Cordón O (2010) Debugging complex software systems by means of pathfinder networks. Inf Sci 180(5):561–583

Serrano E, Muñoz A, Botia J (2012) An approach to debug interactions in multi-agent system software tests. Inf Sci 205:38–57

Serrano E, Rovatsos M, Botia J (2012) A qualitative reputation system for multiagent systems with protocol-based communication. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS’12, vol 1, Richland, SC, pp 307–314. International Foundation for Autonomous Agents and Multiagent Systems

Serrano E, Rovatsos M, Botía JA (2013) Data mining agent conversations: a qualitative approach to multiagent systems analysis. Inf Sci 230(0):132–146

Shie B-E, Yu P, Tseng V (2013) Mining interesting user behavior patterns in mobile commerce environments. Appl Intell 38(3):418–435

Sierra C, Jennings NR, Noriega P, Parsons S (1997) A framework for argumentation-based negotiation. In: Singh MP, Rao AS, Wooldridge M (eds) ATAL. Lecture notes in computer science, vol 1365. Springer, Berlin, pp 177–192

Smith HJ, Milberg SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20:167–196

Solove D (2006) A taxonomy of privacy. Univ PA Law Rev 154(3):477

Spiekermann S (2006) Individual price discrimination—an impossibility? In: International Conference for Human-Computer Interaction (CHI’2006), workshop on privacy and personalization

Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82

Such JM (2011) Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València

Such JM, Alberola JM, Espinosa A, García-Fornes A (2011) A Group-oriented Secure Multiagent Platform. Softw Pract Exp 41(11):1289–1302

Such JM, Espinosa A, García-Fornes A, Botti V (2011) Partial identities as a foundation for trust and reputation. Eng Appl Artif Intell 24(7):1128–1136

Such JM, Espinosa A, García-Fornes A (2013) A Survey of Privacy in Multi-agent Systems. Knowl Eng Rev. doi: 10.1017/S0269888913000180

Such JM, García-Fornes A, Espinosa A, Bellver J (2013) Magentix2: a privacy-enhancing agent platform. Eng Appl Artif Intell 26(1):96–109

TRUSTe and TNS (2009) 2009 study: Consumer attitudes about behavioral targeting

Turow J, King J, Hoofnagle C, Bleakley A, Hennessy M (2009) Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214

Ugurlu S, Erdogan N (2005) An overview of secmap secure mobile agent platform. In: Proceedings of second international workshop on safety and security in multiagent systems

van Blarkom G, Borking J, Olk J (eds) (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent software agents. College bescherming persoonsgegevens, The Hague

Warnier M, Brazier F (2010) Anonymity services for multi-agent systems. Web Intell Agent Syst 8(2):219–232

Westin A (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453

Wine (2009). http://www.w3.org/TR/2004/REC-owl-guide-20040210/wine.rdf

Witten IH, Frank E (1999) Data mining: practical machine learning tools and techniques with Java implementations (The Morgan Kaufmann series in data management systems), 1st edn. Morgan Kaufmann, San Mateo

Xu H, Shatz SM (2003) Adk: an agent development kit based on a formal design model for multi-agent systems. Autom Softw Eng 10:337–365

[-]

This item appears in the following Collection(s)

Show full item record